News and Events

Securing Enterprise Identities For Dummies: Free Live Webinar

In previous blogs, “Securing Enterprise Identities For Dummies, Part One and Part Two,” I wrote extensively about how identity can provide a new layer of security for your organization. Identity can be a powerful security tool for protecting both end-users and privileged users from the leading cause of data breaches — compromised credentials. Implementing an identity platform for both identity as a service and privileged identity management can add a strong player security for your organization.

In Part One, we covered how the traditional network perimeter is inadequate for today’s apps and infrastructure, which are increasingly cloud and mobile. We also covered steps to securing enterprise identities so that any user can obtain secure access to any resource. These steps included:

Take stock of your existing enterprise

Consider the role of identity in cybersecurity

Architect security using identity

Deploy an identity platform for security

Part One of this blog concluded that an identity platform can provide you with a unified and integrated set of tools, auditing, reporting and control across all of your user communities and resources. The benefits of a platform-based approach allow you to achieve the security you are looking for with a consistent set of tools and features, and without the hassle of dealing with so many other vendors. In Part 2 of this blog, I want to cover some of the key features to look for in an identity platform.

In Part Two, we covered some of the key features to look for in an identity platform including:

And finally, we covered how important a strong vendor partnership and support is to success: A vendor that wants to see you succeed can make the difference between a successful rollout and a failed and neglected implementation. Find a vendor that has great references and a reputation for carrying through after the sale.

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.